Workshop on Network Security Analytics and Automation (NSAA) 2016
In conjunction with the 25th International Conference on Computer
Communication and Networks (ICCCN) 2016
Waikoloa, Hawaii, USA, August 1-4, 2016



This workshop provides a forum for researchers to explore promising new
approaches to enable enterprises to quickly determine courses of action in
response to ever changing computer network threats. Emphasis will be
focused on building a sustained ecosystem for network security and using
big data analytics techniques to determine appropriate responses to prevent
massive attack events by neutralizing threats before they have a chance to
gather momentum. To this end effective and safe automation and integration
of security tools are critical. Topics of interest include, but not limited

 .         Cyber threat information sharing standards, ontologies, and
 .         Assessing the reputation of cyber threat intelligence sources
 .         Course of action planning based on shared information
 .         Enrichment of shared threat information
 .         Application of big data analytics to identify threats
 .         Visualization of logs and attack information
 .         Integration of network security responses
 .         Orchestration of responses to threats
 .         Curriculum development related to network security analytics and
 .         Automation of responses
 .         Safety controls for automation
 .         Network resiliency


Each paper will be reviewed by three members of the program committee.
Papers must present novel material and not under review elsewhere at the
time of submission. Two types of papers are accepted:

 .         Full papers (6 pages IEEE format) will appear in the IEEE Xplore
Digital Library and be presented at the workshop. Up to two more pages can
be accommodated if the authors are willing to pay over-length charges at
the time of publication.

 .         Position papers (2 pages) will be published on workshop web site.

Program Committee reserves the right to not review papers that either
exceed the length specification or have been submitted or published
elsewhere. An accepted paper must be presented at the conference venue by
the registered author.

Important Dates:  Paper submission via
https://easychair.org/conferences/?conf=icccn2016 by midnight U.S. Pacific
Time on April 17, 2016. On the submission page, please select the track for
"Workshop on Network Security Analytics and Automation". Notification of
acceptance: May 1, 2016.


Ehab Al-Shaer, University of North Carolina at Charlotte, USA
Zahid Anwar, University of North Carolinat at Charlotte, USA
Gerry Dozier, North Carolina A&T State University, USA
Bill Chu, University of North Carolina at Charlotte, USA  (Co-Chair)
Huirong Fu, Oakland University, USA
Donghui Hu, Hefei University of Technology, China
Hongxin Hu, Clemson University, USA
Di Ma, Univeristy of Michigan-Dearborn, USA
Ashiq Rahman, Tennessee Institute of Technology, USA
Jason Watson, University of Northern Alabama, USA
Jing Xie, FireEye, USA
Anna Yu, North Carolina A&T State University, USA (Co-Chair)
Xianqing Yu, IBM, USA
Justin Zhan, University of Nevada, Las Vegas, USA
Jun Zhu, PayPal, USA

Bill Chu, University of North Carolina at Charlotte, USA (billchu@uncc.edu)